[41600] in bugtraq

home help back first fref pref prev next nref lref last post

Re: [Full-disclosure] [scip_Advisory] NetGear RP114 Flooding Denial ofService

daemon@ATHENA.MIT.EDU (Morning Wood)
Mon Dec 12 16:36:13 2005

Message-ID: <BAY19-DAV239A18AFF13E3BA30261AD9460@phx.gbl>
From: "Morning Wood" <se_cur_ity@hotmail.com>
To: "Marc Ruef" <maru@scip.ch>, <bugtraq@securityfocus.com>,
        <full-disclosure@lists.grok.org.uk>, <news@securiteam.com>,
        <submissions@packetstormsecurity.org>, <partners@secunia.com>
Date: Mon, 12 Dec 2005 01:45:36 -0800
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit

dunno, but i know this has been an issue since the rt314 product (
1999-2000? )
a simple nmap -sS target trigers it external, and no supprise internal as
well.
( not fun running pentests behind one of these babys )
i dont know if you noticed that existing connections dont appear to be
affected
( IM and streaming traffic ) but dns generally gets hosed.

my2bits,
Donnie Werner
http://exploitlabs.com


home help back first fref pref prev next nref lref last post